Blogs | AlienVault
The AlienVault Blogs: Taking On Today’s Threats
Latest

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS

Labs

Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS

How-To

Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS

Our recent tweet chat on pop culture got a lot of people talking. Opinions were thrown in each direction, ranging from the good, bad and the ugly. It got me thinking about two of my favourite things, Hollywood and Information Security. And so I present to you my list of seven cyber security movies fitted into a tried and tested… Read more

Tags:

Most high profile data breaches we have read about recently include credit card data, healthcare data or other personally identifiable information. Less visible are attacks that target specific political groups or high-profile public officials. Occasionally they make the news (such as last year’s breaches at the State Department and the White House) but more often they are not… Read more

Tags: espionage

If pop culture is to be believed, cybersecurity is hot property. Hacks and breaches not only dominate the real-world media but can be seen everywhere in TV and in the movies. These are popping up as plot devices, like in Homeland, or the focus of shows like CSI Cyber and Mr. Robot. But what do industry professionals think of this?… Read more

Tags: cybersecurity, mr. robot

Password. Just saying "password" will cause most information security professionals heartburn, and users will roll their eyes. Even in the movies, bad passwords are a joke: "So the combination is... one, two, three, four, five? That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!"… Read more

Tags: python, password

An incident response methodology can be explained as a collection of procedures aimed at identifying, investigating and responding to potential security incidents in a way that minimizes impact and supports rapid recovery. In this blog, we'll explain how to use the OODA Loop, developed by US Air Force military strategist John Boyd, to create your own incident response methodology.… Read more

Tags: incident response

Get Email Updates

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content

Chat